Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • White Papers // Apr 2014

    Accelerating Incident Response

    Cyber security is a process, not a destination. No matter how well you’re prepared, chances are you will be hacked at some point. Along with a strong security defense strategy, you need a plan to investigate and remediate a breach. This paper presents the advantages of a single-outsourced solution for...

    Sponsored By Dell SecureWorks

  • White Papers // Mar 2014

    Achieving Security with Cloud Data Protection

    More and more organizations are recognizing the value and convenience of using cloud backup to protect server data. This exclusive paper discusses a hosted data storage solution that enables you to reduce the costs, risks and complexity of storing and protecting your business information, taking a heightened focus on...

    Sponsored By HP

  • White Papers // Apr 2014

    SDN: A pragmatic approach to increasing network agility from HP Network Services

    The promise of software-defined networking (SDN) goes well beyond increased automation. Its true value is its ability to free IT to focus on the quality-of-business experience—rather than on network operations—in order to enable more innovation. This is the network of the future, and if you start preparing for it today,...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Jul 2013

    Magic Quadrant for Data Center Network Infrastructure

    The requirements for data center networking equipment have evolved rapidly, with emerging technologies increasingly focused on supporting more automation and simplified operations within a virtualized data center. This new Magic Quadrant focuses on how vendors are meeting the emerging requirements.

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Apr 2014

    Cisco 2014 Annual Security Report

    The recently-released Cisco 2014 Annual Security Report offers a cross-industry look at the major security concerns at the moment as well as malware and vulnerability trends that will be significant in projecting healthcare IT security focuses in the future. The report highlights three key findings – attacks against infrastructure, perimeter...

    Sponsored By Cisco

  • Webcasts // Nov 2013

    On-demand Webcast - Enterprise mobile security done right with Samsung KNOX and Centrify

    Centrify for Samsung KNOX is included as a standard feature set of Samsung KNOX and provides complete Active Directory based Mobile Device Management and Zero Sign-On sign-on for KNOX devices. As a result of Centrify's integration with KNOX, organizations can leverage Centrify's cloud service to comprehensively manage Android users and...

    Sponsored By Centrify

  • Webcasts // Dec 2013

    On-demand Webcast: Secure Collaboration with Dropbox for Business and Centrify SSO for SaaS and mobile

    Dropbox for Business lets you collaborate with ease, making storing and sharing files both intuitive and secure. More than 4 million businesses use Dropbox everyday to work smarter. Centrify and Dropbox have partnered to give Dropbox for Business users single sign-on and provide IT with centralized management and security using...

    Sponsored By Centrify

  • eBooks // Mar 2014

    UC to Go: Connect Your Teams With Unified Communications

    With unified communications (UC), it’s easier for mobile workers to stay connected and stay productive. The challenge is finding the best UC solution to support their work styles. Of businesses that have implemented UC, 82% report ROI met or exceeded expectations, and 70% report that the biggest benefit is “improved...

    Sponsored By Windstream Communications

  • Case Studies // Apr 2014

    Building a Security Incident Response Plan

    Security breaches can cost millions of dollars—but these days they’re virtually inevitable. Every organization needs a formal, documented Computer Security Incident Response Plan (CSIRP) and it needs to be kept up-to-date. In this executive brief, IBM shares the ten most common shortcomings of CSIPRs and how you can avoid these...

    Sponsored By IBM

  • Case Studies // Apr 2014

    Putting Mobile First - Best Practices

    Mobility is now a business fact of life. Will your organization be one with mobile capabilities or a truly mobile enterprise?

    Sponsored By IBM

  • Case Studies // Apr 2014

    IBM Security Services Cyber: Security Intelligence Index

    An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events...

    Sponsored By IBM

  • Case Studies // Apr 2014

    Pervasive Technology Trends: Implications for your Data Center

    Four technology trends—cloud computing, mobile technology, social collaboration and analytics—are shaping the business and converging on the data center. But few data center strategies are designed with the requisite flexibility, scalability or resiliency to meet the new demands. Read the white paper to learn how a good data center strategy...

    Sponsored By IBM

  • eBooks // Feb 2014

    Remote Monitoring and Management: The Key to Proactive, Efficient IT Departments

    For IT professionals to succeed, they need to implement low-cost and high-productivity practices that allow them to have a positive impact on their organizations’ bottom line. Remote monitoring and management (RMM) delivers an arsenal of IT management tools that help IT professionals proactively monitor and remotely manage and resolve IT...

    Sponsored By LabTech Software

  • eBooks // Feb 2014

    Patch Management Best Practices for IT Professionals

    Patch management is one of the largest concerns of IT professionals. With new vulnerabilities being discovered almost daily, keeping systems up-to-date with patches is often a full-time job, especially in larger environments. In addition, the lag time between when vulnerability is discovered and when a virus or worm appears is...

    Sponsored By LabTech Software

  • White Papers // Mar 2014

    The Value of Social Data

    Social media provides a wealth of data that can tell you a lot about your brand and your consumers - providing you can effectively act upon that data. According to Digiday, ""48% of digital marketing executives say they focus 'relentlessly' on building customer insights, yet few are executing those strategies...

    Sponsored By Oracle

  • White Papers // Jan 2014

    IBM’s System Director VMControl: Advanced Multi-Platform Virtualization Management

    For IT personnel looking to manage cross-platform workloads, IBM VMControl can provide an advanced solution. Read the white paper and learn why this technology beats the competition in terms of automated provisioning, systems integration and resource pooling. Also see how this environment offers advanced image management and higher resilience.

    Sponsored By IBM

  • White Papers // Feb 2014

    Strategies to Capture Greater Value from Systems Engineering analyst paper (Taxal)

    This paper discusses the practices that companies should explore to move beyond traditional PLM and ALM to realize the broader capabilities of systems engineering for reducing time to market, meeting regulatory compliance mandates and improving product quality.

    Sponsored By IBM

  • White Papers // Feb 2014

    Rationalizing the software development lifecycle in systems engineering (Ovum)

    Software is not only changing the nature of products, but also the nature of systems engineering. Across many product industry sectors, software is arguably accounting for the lion's share of innovation. For many product engineering organizations, the growth of software content is raising the urgency to ingrain systems engineering mentality...

    Sponsored By IBM

  • White Papers // Feb 2014

    Model-based systems engineering: Revolution or evolution?

    This whitepaper traces the evolution of Model Based Systems Engineering (MBSE), a structured and visual approach for collaborative systems design and development which facilitates early validation of requirements, architectural trade off analysis and mitigation of project risks.

    Sponsored By IBM

  • Videos // Feb 2014

    Design Everywhere Interactive

    Early collaboration with stakeholders is essential and greatly increases the chances of project success. In this interactive demonstration, Bruce Douglass explains how the IBM Rational® solution for collaborative design management can help customers and stakeholders to achieve earlier consensus on the desired design, define requirements for the approved design and...

    Sponsored By IBM

  • Downloads // Nov 2013

    IBM Security AppScan

    IBM® Security AppScan® enables organizations to assess the security of their applications and achieve regulatory compliance by identifying vulnerabilities and generating reports with intelligent fix recommendations to ease remediation.

    Sponsored By IBM

  • Downloads // Nov 2013

    IBM Worklight Developer Edition

    IBM® Worklight is an open, comprehensive, and advanced mobile application platform that helps organizations extend their business to mobile devices. Try it today.

    Sponsored By IBM

  • White Papers // Feb 2014

    Systems Engineering Best Practice: Model-based requirement analysis

    This is a paper on model based requirements analysis where best practices in using modeling for requirements analysis and how that links with requirements management is discussed.

    Sponsored By IBM

  • White Papers // Apr 2014

    IDC: Enterprise Workloads on The IBM X6 Portfolio: Driving Business Advantages

    This paper shows how the new IBM systems with X6 technology were designed to take clients to a new frontier of x86 computing. These new X6 systems are ideal platforms for meeting business-critical demands with data base, business analytics, virtualization and ERP applications.

    Sponsored By IBM

  • White Papers // Apr 2014

    IBM Rational targets engineering lifecycle management (Ovum)

    With increasing amounts of software content, the management of the systems engineering process has also proved increasingly challenging. Software, mechanical, and electrical engineers rely on their own toolsets, with the data from each tool locked away in its own repository. Lacking inter-process standards above the level of Internet protocols, most...

    Sponsored By IBM

  • White Papers // Apr 2014

    IBM: Surviving the Technical Security Skills Crisis

    As new threats emerge every day, the need for qualified security staff is growing - but there aren’t enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security...

    Sponsored By IBM

  • White Papers // Apr 2014

    Where is the ROI for UC?

    What’s the business case for unified communications? The majority of companies (82%) that implement a UC solution earn a positive ROI. Yet, it can be challenging to get key decision makers on board. Learn how to build a business case for UC by evaluating hard- and soft-dollar savings opportunities, exploring...

    Sponsored By Windstream Communications

  • White Papers // Apr 2014

    Using Convergence to Simplify Mobility

    Common misconceptions about unified communications (UC) and mobility may lead IT to dismiss UC solutions, but there’s more to UC than VoIP and more to mobility than cell phones. Find out what UC really is and how it can solve a host of problems for your mobile workers, whether they...

    Sponsored By Windstream Communications

  • White Papers // Mar 2014

    IBM - Giant Leap Forward in Data Services

    As an IT professional, you’ve already dreamt it: a future where you can quickly deploy high availability transactional database systems without the hassle of purchasing, installing, configuring, tuning and testing everything yourself. That day has arrived! The IBM PureData System for Transactions is a pre-integrated database platform that helps you...

    Sponsored By IBM

  • White Papers // Jan 2014

    Guidance for Calculation of Efficiency (PUE) in Data Centers

    Before data center infrastructure efficiency can be benchmarked using PUE or other metrics, there must be agreement on exactly what power consumptions constitute IT loads, what consumptions constitute physical infrastructure, and what loads should not be counted. Unfortunately, commonly published efficiency data is not computed using a standard methodology, and...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2014

    High Efficiency Indirect Air Economizer-based Cooling for Data Centers

    Of the various economizer (free cooling) modes for data centers, using fresh air is often viewed as the most energy efficient approach. However, this paper shows how indirect air economizer-based cooling produces similar or better energy savings while eliminating risks posed when outside fresh air is allowed directly into the...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2014

    Specification of Modular Data Center Architecture

    There is a growing consensus that conventional legacy data center design will be superseded by modular scalable data center designs. Reduced total cost of ownership, increased flexibility, reduced deployment time, and improved efficiency are all claimed benefits of modular scalable designs. Yet the term “modular”, when and where modularity is...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2014

    Types of Prefabricated Modular Data Centers

    Data center systems or subsystems that are pre-assembled in a factory are often described with terms like prefabricated, containerized, modular, skid-based, pod-based, mobile, portable, self-contained, all-in-one, and more. There are, however, important distinctions between the various types of factory-built building blocks on the market. This paper proposes standard terminology for...

    Sponsored By APC by Schneider Electric

  • White Papers // Feb 2013

    IDC: Mobile Video Collaboration - The New Business Reality

    The powerful combination of mobility and real-time video communications is further enhanced by the bring-your-own-device (BYOD) trend in mobility. This consumerization of IT brings to bear a number of new concerns about liability, privacy, and security. As a result, enterprise IT stakeholders are rapidly building a strategy for BYOD through...

    Sponsored By Polycom

  • White Papers // Mar 2014

    Innovating Through Cloud Technologies: Change is in Your hands

    EMA research shows that organizations typically encounter numerous challenges when leveraging cloud. These issues do not emerge on PowerPoint during the cloud vendor's sales presentation, but become evident when the cloud deployment project begins. In addition, most enterprises have much work left to do in terms of data center automation,...

    Sponsored By frontrange

  • White Papers // Feb 2014

    Enhancing Business Value with HP Wireless Networking Solutions

    The mobile device revolution is transforming the enterprise. One of the four major pillars supporting the 3rd Platform of computing — along with cloud, Big Data, and social technologies — mobile technology is helping organizations realize new sources of competitive advantage and making employees more productive by enabling them to...

    Sponsored By Hewlett-Packard (HP)

  • Podcasts // Jan 2014

    The Manager of Managers Approach to Running Your IT Environment Virtual Event

    Do you have a single console to view, control, and manage your IT environment? Is automation built into your monitoring strategy? As IT environments become more dynamic, your operations teams need a unified view for management and monitoring. Automatic detection, and automated monitoring setup and configuration are two ways to...

    Sponsored By Hewlett-Packard (HP)

  • Webcasts // Jan 2014

    The shift from servers to services: Charting your future in the cloud era webcast

    The cloud is not only changing how you source and deliver technology. It’s also leading IT organizations to be more service-centric. This shift impacts IT on many levels. It refocuses IT organizations and changes how they operate and provide services. Find out why shifting from servers to services will help...

    Sponsored By Hewlett-Packard (HP)

  • Podcasts // Jan 2014

    Thinking ahead: Pragmatic steps for successful cloud transformations virtual event

    Public, private, or hybrid, the cloud is creating an array of opportunities for business and IT. And it’s reshaping IT as we know it. But incorporating cloud technology and services into the data center can entail multi-year transformations. The key to successful cloud transformations is developing a pragmatic strategy and...

    Sponsored By Hewlett-Packard (HP)

  • Case Studies // Feb 2014

    Vodafone Ireland implements world-class service excellence with HP BSM

    Learn how business service management helped Vodafone Ireland transform from a reactive to a proactive IT Operations function. Read how BSM solutions enabled the Vodafone IT Operations group to align priorities to match the business and drive business value, delivering 300% ROI in one year. HP is the sponsor...

    Sponsored By Hewlett-Packard (HP)